Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IDS
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
mobile ad-hoc network
trust relationship
Throughput
telecommunication security
telecommunication network routing
single malicious node
Routing protocols
routing attacks
Routing
Resiliency
pubcrawl
packet delivery ratio
notice participation
black hole
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
Intrusion Detection
IDS
gray hole
defense mechanism
data packets
composability
biblio
Anomaly Based Detection Analysis for Intrusion Detection System Using Big Data Technique with Learning Vector Quantization (LVQ) and Principal Component Analysis (PCA)
Submitted by grigby1 on Fri, 03/15/2019 - 11:52am
Big Data
IDS
Learning Vector Quantization
Metrics
network security
Principal Component Analysis (key words)
privacy
pubcrawl
threat vectors
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Linux
SSH service attack
SSH honeypot architecture
Software Architecture
Servers
secure shell honeypot
secure shell
Scalability
Resiliency
resilience
pubcrawl
port knocking
operating systems
authentication
kippo honeypot
IP networks
intrusion detection system
IDS
Human Factors
Human behavior
honeypot
honey pots
Force
computer network security
Computer crime
biblio
A NOVEL APPROACH TO DETECT DDOS ATTACK THROUGH VIRTUAL HONEYPOT
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Human behavior
virtual honeypot
uncommon attacks
strange vindictive attacks
Servers
Scalability
Resiliency
resilience
pubcrawl
Mitigation and hybrid algorithms
IP networks
intrusion prevention system
Interruption counteractive action framework
Internet Service Providers level
IDS
Human Factors
authority level system attacks
honeypot system
honey pots
Floods
expensive network resources
exceptional security risk
end-clients
distributed denial-of-service attack
digital attacks
detection
DDoS Attacks
DDoS Attack
computer network security
Computer crime
botnet
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
Fog computing and security issues: A review
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
Data Security
security of data
privacy
mobile computing
IoT
Internet of Things
IDS
fog computing technology
edge computing
DoS
pubcrawl
data privacy
computing services
Computers
cloud computing paradigm
Cloud Computing
Scalability
Resiliency
security
Fog computing
biblio
An FPGA Coarse Grained Intermediate Fabric for Regular Expression Search
Submitted by grigby1 on Wed, 09/12/2018 - 11:24am
deep packet inspection
FPGA
IDS
overlay
pubcrawl
regular expression
resilience
Resiliency
Scalability
biblio
Cyber-Attack Detection for Industrial Control System Monitoring with Support Vector Machine Based on Communication Profile
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
IDS
penetration tests
privacy
production engineering computing
Support vector machines
Training
cyber-attack detection
Europe
ICS Anomaly Detection
pubcrawl
resilience
ICS communication profile
support vector machine
industrial control
industrial control system monitoring
Resiliency
Scalability
security
security of data
integrated circuits
Intrusion Detection Systems
cyber security test
Monitoring
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
Resiliency
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
mobile ad hoc networks
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
AODV
Metrics
MANET
IDS
high destination sequence number
destination nodes
delays
data packets
cross checking
Conferences
Compositionality
clustering
byzantine attacks
Blackhole
black-hole attack mitigation techniques
attack mitigation
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »